Project Category: Student

Directory Services

Information Technology Services has two directory service offerings. Microsoft’s Active Directory is a centralized and standardized system for Microsoft Windows hosts that automates network management of user data, security, and distributed resources and enables inter-operation with other directories. The enterprise Active Directory is hosted and managed by Information Technology Services.

ITS also provides enterprise GAL (Lightweight Directory Access Protocol) services to enable the searching and browsing of directory information in its central information systems. The GAL service is used for authentication by many university information systems as well as for address look ups by some email clients and the online GC Faculty, Staff and Student directories.

GC Active Directory (GC AD)

Joining the GC Active Directory (GC AD) offers several advantages to system administrators and computer users. The GC AD is already integrated with campus infrastructure for DNS and GAL. GCAD provides support for a single sign-on environment with other Active Directory integrated services and improved security at the desktop level. Active Directory can also help system administrators with software distribution and easier control of Windows-based computers via Group Policy Objects. Using Active Directory, you can efficiently manage users, computers, groups, printers, applications, and other directory-enabled objects from one secure, centralized location.

Services Provided:

  • Support for the hardware, security, redundancy, and backup of the domain controller machines that run the GC AD forest
  • Delegated management for OU Administrators
  • Integration with the campus GAL directory service which automatically creates the accounts for faculty, and staff in GC AD
  • Integration with the campus GAL directory service which updates user attributes in the directory
  • Integration with the campus (BIND-based) DNS service
  • Easier computer resource management through Group Policy Objects (GPO), remote software installation (SMS), and the establishment of minimum security requirements.
  • Forum for discussion of Active Directory and Active Directory Security issues through an AD community group
  • Notice of important changes and scheduled maintenance through the AD Community contact list and the ITS Change List.
  • Support for development and distribution of utility and administrative scripts and a knowledge base to help administrators find a quick solution to common problems.
  • Support for user and machine certificates via the GC AD PKI service


  • A single, consistent point of management for users, applications, and devices.
  • Simplified management and use of file and print services making network resources easier to find, configure and use.
  • A central control of authentication information to manage security services for internal desktop users and remote users.
  • A single sign-on to active directory integrated network resources for users.

GC Active Directory (GC AD) account:

  • Active directory accounts will be created automatically. If your account is not present please fill out the form below.

The GAL (Global Address List) has two main uses. First, it can be queried for directory information (phone, email, etc.) for GC faculty, staff and students, either from the GC website or within your email client. It is also used for authentication by university information systems, including logging into Canvas, Webmail and many other central and departmental applications.

Instructions on how to configure your email client can be found by contacting the service desk.

LDAP Authentication

If you would like to set up your departmental application to authenticate users using username and password, please complete a Data Access Request and submit a case.

For more information on connecting to the LDAP or to download new certificates.


Delegated Access

Delegated Access

It’s easy to set up:

  • Delegated Access is a lot like Parent/Third-Party Access. A student still registers a parent/third-party (delegate), giving him or her access to categories of information.
  • After a student registers a delegate, that individual receives an email containing step-by-step instructions for activating delegated access.

It’s customizable:

  • Delegated Access allows a student to select categories of information that a third party can view, and if necessary, on which that third party can perform transactions.
    • If the student selects it, a delegate can now access financial aid information in addition to all of the items that were previously accessible.

It’s secure:

  • Delegated Access offers increased security.
    • IMPORTANT! A student assigns the delegate a PIN code. The student is responsible for remembering and communicating the PIN code to the delegate.
    • The PIN is used by GC staff for identity verification in the event a delegate contacts the university regarding a student’s information.
    • This verification system provides even greater security for student information.

It facilitates communication:

  • Finally, the new Delegated Access enhances communication-between a delegate and the student(s), and university staff and delegates.
    • The page view a delegate sees and the page view a student sees are virtually the same. This allows the student to walk a delegate through the user interface, helping everyone stay “on the same page.” All parties remain in the loop!


  • If you previously had parent/third-party access, as of July 1, 2013, that access is no longer available; thus,
  • if you are accepting delegate access from a student and your current GCID is an email address, you must reactivate your account.
  • Do so by clicking the link under To create a new account because you do not have an GC account . . . in the confirmation email.

Contact Us



Computing Technology Support

Computing Technology Support


From administrative and faculty computers to digital classrooms and student labs, CTS is the best choice for comprehensive technology service. CTS provides workstation management and network support to its partners on-site and via remote assistance.

Support Services

OS Updates (OS X and Windows Only)
MS Office Application Updates (2013 or higher)
Windows Server OS security and critical updates
Print Server Configuration
OS imaging server available for images
Virus and Malware scanning (SCEP) and automated cleaning
Lifecycle replacement recommendation
Active Directory management
Network Access Control management
Remediation of discovered security vulnerabilities
Backup and migration of user data
Advanced cleaning/removal of viruses and malware
Data destruction of decommissioned computers
Setup and troubleshooting of printers
Annual IT assessment


CTS will work with your department to develop plan to transition to supported service, and then provide ongoing support for your users. CTS will provide yearly recommendations for workstation lifecycle replacements to help keep your IT inventory fresh and using current technology.


CTS provides installation services for applications and/or specialized software provided by your department. While CTS will ensure that applications are installed and maintained properly, it is the responsibility of the department to guide users on the proper usage of any application.


CTS can coordinate obtaining warranty service provided by the manufacturer to speed hardware repairs or replacements. Any fees for repairs and repair parts are the responsibility of the customer and will be coordinated with the Departmental Contact

Response Time Guidelines


ITS will respond to Urgent requests within (2) business hours. Urgent requests are those that meet one or more of the following criteria:

  • Multiple users are affected
  • User’s computer is not functional
  • User is unable to send or receive email
  • User has a deadline or on a time sensitive task
  • Security of one or more machines is compromised


ITS will respond to Normal requests within (4) business hours. Normal requests are those that meet one of the following criteria:

  • Request is not specified as urgent by the customer.
  • User is experiencing an application problem that does not interfere with critical function
  • User has an informational question


ITS will respond to planned requests as coordinated with the Departmental Contact. Planned requests are those that require scheduling, research, or other advance preparation. Examples might include, but are not limited to the following:

  • Computer installations
  • Regular Maintenance
  • Hardware upgrades or service
  • Physical computer relocation

How do I request support for an existing service?

If you or your department are currently supported by CTS, assistance can be requested by submitting a case via the GC Service Center by filling out the form below.

1 + 15 =

Contact Us




GC Campus Wi-Fi

GC campus Wi-Fi offers convenient, widely-available, high-speed wireless network access to the Galveston College community. Three unique networks provide expansive outdoor coverage as well as indoor availability throughout the college.


This is the college’s Wi-Fi network for students. The network provides a secure connection, automatic login and greater mobility to stay connected when roaming around campus.

Contact Us



Computer Lab

Computer Lab

Information Technology provides three campus computer labs that are available to the entire college. These labs are open to all GC students, faculty and staff with a valid school ID when classes are not in session. To sign in to a computer in the public lab, use your GC ID and password.

Important Lab Info

  • Eating and drinking are prohibited in the lab.
  • Cell phone usage is discouraged in the lab.
  • Recovery of files from damaged flash drives is not always possible, so save frequently and backup your work to more than one storage device.

Lost and Found

Items which are left in the lab are transferred to the university Lost and Found office in Northern Building Room 102.

Contact Us



Abuse Email Management

Reporting Internet Abuse


This is the contact method for reporting spam, phishing attempts, malicious email, and other types of misuse of IT resources within the GC community.

Reporting Spam

The IT team will take necessary action on reports of spam, phishing scams, and other unsolicited email. In order for us to effectively filter spam we need all submissions to to include the following things:

  • A forwarded copy of the original email with email headers included or attached
  • For information on how to obtain email headers please click here.

Copyright Infringement

Copyright protects authors of “original works” by law and violators are subject to the Digital Millennium Copyright Act (DMCA). In the past ABUSE submissions for copyright violations were handled by our IT team, but this is no longer the case. Please route copyright-related mail to, and if you have further questions about copyright compliance guidelines please click here

Information Security Policy

GC faculty, staff, and students must be in compliance with the College’s Information Security Policy upon enrollment or effective hire date. The University Information Security Policy sets guidelines for appropriate use of Galveston College technology resources and prohibits use of IT resources for commercial use and personal gain.

E-mail Safety Tips

  • Use your University e-mail address for essential, educational use only.
  • Use filters and/or rules to move emails to folders or to delete.
  • Delete messages from untrusted sources and empty your trash.
  • Keep your anti-virus software updated.
  • Talk to your department IT representative if you need more assistance.

Contact Us